"Fossies" - the Fresh Open Source Software Archive  

Source code changes of the file "doc/Federation.md" between
n2n-3.0.tar.gz and n2n-3.1.1.tar.gz

About: n2n is a layer-two peer-to-peer virtual private network (VPN) which allows bypassing intermediate firewalls.
Pre-release.

Federation.md  (n2n-3.0):Federation.md  (n2n-3.1.1)
skipping to change at line 39 skipping to change at line 39
This specific mechanism is also used during the registration process taking plac e between edges and supernodes, so edges are able to learn about other supernode s. This specific mechanism is also used during the registration process taking plac e between edges and supernodes, so edges are able to learn about other supernode s.
Once edges have received this information, it is up to them choosing the superno de they want to connect to. Each edge pings supernodes from time to time and rec eives information about them inside the answer. We decided to implement a work-l oad based selection strategy because it is more in line with the idea of keeping the workload low on supernodes. Moreover, this way, the entire network load is evenly distributed among all available supernodes. Once edges have received this information, it is up to them choosing the superno de they want to connect to. Each edge pings supernodes from time to time and rec eives information about them inside the answer. We decided to implement a work-l oad based selection strategy because it is more in line with the idea of keeping the workload low on supernodes. Moreover, this way, the entire network load is evenly distributed among all available supernodes.
An edge connects to the supernode with the lowest work-load and it is re-conside red from time to time, with each re-registration. We use a stickyness factor to avoid too much jumping between supernodes. An edge connects to the supernode with the lowest work-load and it is re-conside red from time to time, with each re-registration. We use a stickyness factor to avoid too much jumping between supernodes.
Thanks to this feature, n2n is now able to handle security attacks such as DoS a gainst supernodes and it can redistribute the entire load of the network in a fa ir manner between all the supernodes. Thanks to this feature, n2n is now able to handle security attacks such as DoS a gainst supernodes and it can redistribute the entire load of the network in a fa ir manner between all the supernodes.
To serve scenarios in which an edge is supposed to select the supernode by round trip time, i.e. choosing the "closest" one, the `--select-rtt` command line opt ion is available at the edge. Note, that workload distribution among supernodes might not be so fair then. To serve scenarios in which an edge is supposed to select the supernode by round trip time, i.e. choosing the "closest" one, the `--select-rtt` command line opt ion is available at the edge. Note, that workload distribution among supernodes might not be so fair then.
Furthermore, `--select-mac` would switch to a MAC address based selection strate
gy choosing the supernode active with the lowest MAC address.
 End of changes. 1 change blocks. 
0 lines changed or deleted 0 lines changed or added

Home  |  About  |  Features  |  All  |  Newest  |  Dox  |  Diffs  |  RSS Feeds  |  Screenshots  |  Comments  |  Imprint  |  Privacy  |  HTTP(S)